• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/99

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

99 Cards in this Set

  • Front
  • Back
1. Is the Internet and Web the same?
No
2. An intranet is built using Web technologies, but an extranet is not.
False
3. Secured intranet or extranet applications usually require the use of a virtual private network (VPN)
True
4. What is an assigned address for each computer on the Internet called?
Uniform Resource Locator (URL)
5. What is the standard page description language for Web pages?
d) Hypertext Markup Language (HTML)
6. What is the markup language used within a Web page to describe and transfer data between Web service applications?
c) Extensible Markup Language (XML)
7. With what technology, phone calls and fax transmissions can be routed over the same network that is used for data?
a) Voice over IP (VoIP)
8. A centralized governing body controls the Internet.
b) False
1. The ___ market is considerably larger and is growing more rapidly than the ___ market.
a) B2B, B2C
2. One of the major challenges of e-commerce is to define an effective e-commerce model and strategy.
a) True
3. Copyright law protects authored works such as books, film, images, music, and software from unauthorized copying.
a) True
4. The fact that residents in cities have access to broadband Internet while those living in rural areas don’t is an example of ___
b) Digital divide
5. ___ entails sending bogus messages purportedly from a legitimate institution to pry personal information from customers by convincing them to go to a “spoofed” Web site.
c) Phishing
6. E-commerce requires merchants to always host their own Web sites.
b) False
7. ___ parses HTTP request, validates user identity and authorization, processes request, and return the result back to the browser.
d) Web server
8. ___ is the communications protocol used to keep credit card numbers and banking information secure.
b) Secure Sockets Layer (SSL)
1. What type of processing method waits until a number of transactions are accumulated before entering them into the computer system?
b) Batch processing
2. ERP systems operate via an integrated database, using one set of data to support all business functions.
a) True
3. A network of business entities, relationships, and processes needed to design, build, and sell a product makes up a(n)
c) Supply chain
4. Information for customer relationship management (CRM) is captured from all customer touch-points, such as telephone, fax, e-mail, the company's website, retail stores, and personal contact.
a) True
5. The target market for the hosted software model is primarily large companies.
False
1. What kind of decision model finds the best solution?
b) Optimization
2. What MISs support management in their efforts to develop, promote, and sell new products?
d) Marketing MISs
3. What DSS analysis sets a target value for a variable and then repeatedly changes other variables until the target value is achieved?
c) Goal-seeking
4. What component of a DSS is used to house models used in different functional areas?
b) Model base
5. A GSS contains all the components of a DSS.
a) True
Internet:
a collection of interconnected networks, all freely exchanging information
How the Internet Works
Internet transmits data from one computer (called a host) to another

Data is passed in chunks called packets
Transmission Control Protocol (TCP):
widely used transport layer protocol that is used in combination with IP by most Internet applications
Internet Protocol (IP):
communication standard that enables traffic to be routed from one network to another as needed
Uniform Resource Locator (URL):
assigned address on the Internet for each computer
Several Ways to Access the Internet
Connect via LAN server

Connect via Serial Line Internet
Protocol (SLIP)/Point-to-Point Protocol (PPP)

Connect via an online service

Other ways to connect cell phones, PDAs, and home appliances: e.g., wireless application protocol (WAP) for cell phones
The World Wide Web
Also called the Web, WWW, or W3

Menu-based system that uses the client/server model

Organizes Internet resources throughout the world into a series of menu pages, or screens, that appear on your computer
Hypertext Markup Language (HTML):
standard page description language for Web pages
HTML tags:
let the browser know how to format text on a Web page and whether images, sound, and other elements should be inserted
Extensible Markup Language (XML):
markup language for Web documents containing structured information, including words, pictures, and other elements
Web browser:
software that creates a unique, hypermedia-based menu on a computer screen, providing a graphical interface to the Web

Menu consists of graphics, titles, and text with hypertext links
Popular Web browsers:
Microsoft Internet Explorer, Netscape Navigator, Mozilla Firefox, Apple Computer’s Safari
Applet:
small program embedded in Web pages
Web browser plug-in:
external program that is executed by a Web browser when it is needed
Web programming language- Java
Object-oriented programming language from Sun Microsystems based on C++

Allows small programs (applets) to be embedded within an HTML document
Web services:
standards and tools that streamline and simplify communication among Web sites for business and personal purposes
Internet and Web applications
e-mail, instant messaging, Internet cell phones, newsgroups, Web shopping
Internet phone and videoconferencing
blog, vlog, podcast
Content streaming
Social networking
Wiki …
Net Issues
Management issues
Preventing attacks
Squatting
Service and speed issues
Keeping up with Internet traffic and traffic on company intranets
Privacy
Fraud
Security
Unauthorized Internet sites
Business-to-Business e-commerce (B2B)
All the participants are organizations
Focus on organizational needs and purchasing processes
Useful tool for connecting business partners in a virtual supply chain to cut resupply times and reduce costs
Business-to-Consumer e-commerce (B2C)
Customers deal directly with an organization and avoid intermediaries
Squeezes costs and inefficiencies out of supply chain
Can lead to higher profits
Can lead to lower prices for consumers
Focus on understanding consumer behavior when using online channels
Consumer-to-Consumer e-commerce (C2C)
Consumers selling directly to other consumers
Focus on facilitating exchange of information and goods among consumers
Types of E-commerce
B2B
B2C
C2C
Multi-Stage Model for E-commerce
1- Search and Identification
2- Selection and Negotiation
3- Purchasing
4- Product and Service Delivery
5- After Sales service
Technology Needed for Mobile Commerce
Improved interface between the wireless device and its user
Improved network speed
Security
Encryption, digital certificates
Web applications that are accessible for handheld users
Mobile Commerce in Perspective
Only 12 to 14 percent of the world’s 1.8 billion mobile phone users have ever used the Web from their phones

Obstacles of adoption?
Internet Corporation for Assigned Names and Numbers (ICANN) created a .mobi domain to help attract mobile users to the Web

Market for m-commerce in North America is maturing much later than in Western Europe and Japan
Advantages of Electronic and Mobile Commerce
Improves customer service:

Increases speed and accuracy

Reduces costs:

Global reach: helps reduce gap between rich and poor countries
Global reach:
helps reduce gap between rich and poor countries
Reduces costs:
Costs of search, collecting and processing product information, negotiating costs
Increases speed and accuracy
Speeds the flow of goods and information
Eliminates human data-entry error
Improves customer service:
Information about delivery status and ability to meet customer demand
Offer creative ways of product bundling and versioning that were not possible before
Unbundling of information flow from the flow of physical goods through the value chain
Threats of E-commerce
Security
Theft of intellectual property
Fraud
Invasion of privacy
Lack of Internet access
Return on investment: difficult to forecast project costs and benefits
Legal jurisdiction
Taxation
Theft of Intellectual Property
Digital Rights Management (DRM):
Fraud
Phishing:

Click fraud:
Invasion of Consumer Privacy
Online profiling:

Clickstream data
Lack of Internet Access
Digital divide
Key Technology Infrastructure Components
-Network, Internet

-Connection

-E-commerce Software

-Server Software

-Server Operating System

-Web server hardware
Web Server Hardware
Storage capacity and computing power required of the Web server
Web Server Software
Security and identification

Retrieving and sending Web pages

Web site tracking

Web site development
Electronic Payment Systems
A primary concern is the need to use identification and encryption techniques to safeguard business transactions

Digital certificate:

Secure Sockets Layer (SSL):
Digital certificate:
attachment to an e-mail message or data embedded in a Web page that verifies the identity of a sender or a Web site
Secure Sockets Layer (SSL):
communications protocol used to secure sensitive data
Traditional Transaction Processing Methods
Batch processing system

Online transaction processing (OLTP)
Batch processing system
Computerized processing in which business transactions are accumulated over a period of time and prepared for processing as a single unit or batch
Online transaction processing (OLTP)
Computerized processing in which each transaction is processed immediately
Traditional Transaction Processing Applications
Order Processing
Purchasing
Accounting
Legacy System Approach
Separate Information storage files for different business applications
Enterprise Systems Approach
Consolidated Information Storage
Enterprise system:
ensures information can be shared across all business functions and all levels of management to support the running and managing of a business
Enterprise resource planning (ERP):
set of integrated programs that manage a company’s vital business operations for an entire multisite, global organization
Benefits of ERP
Improved access to data for operational decision making
Elimination of costly, inflexible legacy systems
Improvement of work processes based on best practices
Upgrade of technology infrastructure
Challenges of ERP
Requires huge investments of cost and time
A very complex process of implementation
Redesigning business processes and training employees is challenging (change is hard)
Converting data from legacy systems takes time
Difficulty integrating with other systems
Risks in using one vendor
Risks of failure are large
Costs of ERP
Re engineering

Data Conversions

Training and Change Management

Software

Hardware
Causes of ERP Failures
Underestimating complexity, costs, and time for implementing ERP

Use of software suite and implementation plan used elsewhere without adapting

Failure to involve employees affected by ERP

Over reliance on ERP software vendor claims
Supply Chain Management (SCM)
A cross-functional interenterprise system that uses information technology to help support and manage the links between some of a company’s key business processes and those of its suppliers, customers, and business partners
SCM Functions
Planning

Execution
SCM Benefits
Faster, more accurate order processing

Reductions in inventory levels

Quicker times to market

Lower transaction and material costs

Strategic relationship with suppliers
Customer relationship management (CRM) system
Integrates and automates all aspects of customer encounters
Benefits of CRM
Identify and target best customers
Real time customization and personalization of products and services
Tracking of customers and their needs, regardless of points of contact
Provide consistent experience and superior service to customers
Hosted software
No need to make a major financial investment

No need to employ a full-time IT person

Reduced hardware costs and costs associated with maintaining an appropriate computer environment

Some large companies are also experimenting with hosted software

Provides common systems platform and business processes for transition to global centers
Functional Aspects of the MIS
Supply Chain and Business Transactions

ERP Systems
Management information system (MIS)
Providing the right information to the right people in the right format and at the right time

Provides managers with information that supports effective decision making and provides feedback on daily operations
MIS Inputs
Internal data sources
TPSs and ERP systems and related databases
Data warehouses and data marts
Specific functional areas throughout the firm

External data sources
Customers, suppliers, competitors, and stockholders whose data is not already captured by the TPS
Internet
Extranets
MIS Outputs
Reports
Different Decisions
Top Management- Unstructured, Strategic

Middle Mgmt- Semi-structured, Tactic

Lower Mgmt- Structured, Operational
Three Decision making models
Optimization model:
Satisficing model:
Heuristics:
Optimization model:
find the best solution, usually the one that will best help the organization meet its goals
Satisficing model:
find a good—but not necessarily the best—problem solution
Heuristics:
commonly accepted guidelines or procedures that usually find a good solution
Focus of a DSS is on...
decision-making effectiveness regarding unstructured or semistructured business problems
Components of a Decision Support System
Database

Model base

Dialogue manager: user interface that allows decision makers to:
Easily access and manipulate the DSS

Use common business terms and phrases

Access to the Internet, networks, and other computer-based systems
Basic Types of DSS Analysis
What-if Analysis
Sensitivity Analysis
Goal Seeking
Optimization
What-if Analysis –
end user makes changes to variables, or relationships among variables, and observes the resulting changes in the values of other variables
Sensitivity Analysis –
value of only one variable is changed repeatedly and the resulting changes in other variables are observed